WO2022252867A1 - Procédé de communication et appareil de communication - Google Patents

Procédé de communication et appareil de communication Download PDF

Info

Publication number
WO2022252867A1
WO2022252867A1 PCT/CN2022/088341 CN2022088341W WO2022252867A1 WO 2022252867 A1 WO2022252867 A1 WO 2022252867A1 CN 2022088341 W CN2022088341 W CN 2022088341W WO 2022252867 A1 WO2022252867 A1 WO 2022252867A1
Authority
WO
WIPO (PCT)
Prior art keywords
network slice
network
configuration information
data
sdt
Prior art date
Application number
PCT/CN2022/088341
Other languages
English (en)
Chinese (zh)
Inventor
酉春华
徐小英
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP22814914.2A priority Critical patent/EP4336884A1/fr
Publication of WO2022252867A1 publication Critical patent/WO2022252867A1/fr
Priority to US18/522,425 priority patent/US20240098830A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • H04B17/328Reference signal received power [RSRP]; Reference signal received quality [RSRQ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/1263Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows
    • H04W72/1268Mapping of traffic onto schedule, e.g. scheduled allocation or multiplexing of flows of uplink data flows
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/19Connection re-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections
    • H04W76/27Transitions between radio resource control [RRC] states

Definitions

  • the present application relates to the communication field, and more specifically, to a communication method and a communication device.
  • a terminal device in a non-connected state can perform data transmission without performing radio resource control (radio resource control, RRC) state switching.
  • RRC radio resource control
  • This data transmission mechanism is For small data transmission (small data transmission, SDT).
  • SDT small data transmission
  • no SDT scheme based on network slicing has been proposed so far, which cannot meet the needs of different users.
  • the present application provides a communication method in order to realize the SDT solution based on network slicing and meet the needs of different users.
  • a communication method is provided, the method is applied to a terminal device, and the method includes: receiving first SDT configuration information from a first network device, where the first SDT configuration information corresponds to a first network slice; according to the The first SDT configuration information sends a radio resource control RRC recovery request message and data of the first network slice to the first network device.
  • the first network device sends SDT configuration information at the granularity of network slicing (for example, the first SDT configuration information) to the terminal device, so that the terminal device can perform SDT transmission based on network slicing according to the SDT configuration information at the granularity of network slicing ( For example, sending the data of the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • SDT configuration information at the granularity of network slicing for example, the first SDT configuration information
  • the terminal device can perform SDT transmission based on network slicing according to the SDT configuration information at the granularity of network slicing ( For example, sending the data of the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • the first SDT configuration information includes an identifier of the first network slice or an identifier of a first network slice group, and the first network slice group includes the first network slice slice.
  • the terminal device can determine according to the identifier of the first network slice or the identifier of the first network slice group, The first SDT configuration information corresponds to the first network slice, so as to realize the SDT solution based on the network slice.
  • the method further includes: receiving first indication information from the first network device, where the first indication information is used to indicate that the first SDT configuration information is related to the Corresponding to the first network slice or the first network slice group, the first network slice group includes the first network slice.
  • the first network device sends the first indication information to the terminal device, so that the terminal device can determine that the first SDT configuration information corresponds to the first network slice according to the first indication information, thereby implementing a network slice-based SDT solution.
  • the first SDT configuration information corresponds to a first radio bearer (radio bearer, RB), the first RB corresponds to the first network slice, and the first The data of the network slice is the data of the first RB.
  • radio bearer radio bearer
  • the SDT configuration information sent by the first network device to the terminal device may be at the RB granularity (for example, the first SDT configuration information), so that the terminal device can perform RB-based SDT transmission according to the SDT configuration information at the RB granularity (for example, Send the data of the first RB corresponding to the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • the RB granularity for example, the first SDT configuration information
  • the terminal device can perform RB-based SDT transmission according to the SDT configuration information at the RB granularity (for example, Send the data of the first RB corresponding to the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • the first SDT configuration information includes the identifier of the first RB.
  • the terminal device can determine that the first SDT configuration information corresponds to the first RB according to the first RB identifier, thereby realizing the RB-based SDT solution.
  • the method further includes: receiving second indication information from the first network device, where the second indication information is used to indicate that the first SDT configuration information and the The first RB corresponds.
  • the first network device sends the second indication information to the terminal device, so that the terminal device can determine that the first SDT configuration information corresponds to the first RB according to the second indication information, thereby implementing the RB-based SDT solution.
  • the method further includes: receiving second SDT configuration information from the first network device, where the second SDT configuration information corresponds to the second RB, and the second The RB is different from the first RB, and the second RB corresponds to the first network slice, and the resource indicated by the first SDT configuration information is different from the resource indicated by the second SDT configuration information.
  • the first network device sends SDT configuration information corresponding to different RBs to the terminal device, and the resources indicated by the SDT configuration information corresponding to different RBs are different, so that the RB-based SDT solution can be implemented.
  • the first SDT configuration information includes at least one of the following information: data amount threshold, reference signal received power (reference signal received power, RSRP) threshold, security Parameters, configuration grant (configure grant, CG) time domain resources, CG frequency domain resources, CG (demodulation reference signal, DMRS) configuration, synchronization signal and physical broadcast channel (physical broadcast channel block, PBCH) block identification, Search space or control resource set, preamble, random access channel time-frequency resource, physical uplink shared channel (PUSCH) time-frequency resource of random access message A, DMRS configuration of PUSCH of random access message A , the uplink carrier selection threshold.
  • data amount threshold reference signal received power (reference signal received power, RSRP) threshold
  • security Parameters configuration grant (configure grant, CG) time domain resources, CG frequency domain resources, CG (demodulation reference signal, DMRS) configuration, synchronization signal and physical broadcast channel (physical broadcast channel block, PBCH) block identification, Search space or control resource set, preamble, random access channel
  • the first SDT configuration information includes the data volume threshold, and the RRC recovery request message and the first SDT configuration information are sent to the first network device according to the first SDT configuration information.
  • the data of a network slice includes: when the sum of the data volumes of the network slices corresponding to the first SDT configuration information is less than or equal to the data volume threshold, sending the RRC recovery request message and the first network device to the first network device
  • the network slice corresponding to the first SDT configuration information includes the first network slice.
  • the first SDT configuration information includes the RSRP threshold, and the RRC recovery request message and the first SDT configuration information are sent to the first network device according to the first SDT configuration information.
  • the data of the network slice includes: when at least one synchronization signal corresponding to the first SDT configuration information and the RSRP of the PBCH block are greater than or equal to the RSRP threshold, sending the RRC recovery request message and the first network device to the first network device The sliced data.
  • the terminal device determines whether to trigger the SDT process according to at least one synchronization signal corresponding to the first SDT configuration information and the RSRP of the PBCH block, which can realize the isolation of network slices under different synchronization signals and PBCH blocks, so as to meet the requirements of different users. need.
  • the first SDT configuration information includes the security parameter
  • the security parameter includes a next hop chaining counter (next hop chaining counter, NCC)
  • the method further includes: Encrypting the data of the first network slice using a key determined according to the NCC; sending an RRC recovery request message and the data of the first network slice to the first network device according to the first SDT configuration information , including: sending the RRC recovery request message and encrypted data of the first network slice to the first network device.
  • NCC next hop chaining counter
  • the terminal device determines the key according to the NCC, and encrypts the data of the first network slice according to the key, so that a secure SDT solution based on network slice can be realized.
  • the method further includes: recovering the suspended RB corresponding to the first network slice or the first network slice group, where the first network slice group includes the first For a network slice, the suspended RB corresponds to the data of the first network slice.
  • the method further includes: not restoring the RBs corresponding to the third network slice or the third network slice group, where the third network slice is different from the first network slice, The third network slice group is different from the first network slice group.
  • the method further includes: sending third indication information to the first network device, where the third indication information indicates that data of a third network slice arrives, and the first The three indication information is carried in the same message as the RRC recovery request message and the data of the first network slice.
  • the first SDT configuration information is included in an RRC release message or a system message.
  • a communication method is provided, the method is applied to a first network device, and the method includes: sending first SDT configuration information to a terminal device, where the first SDT configuration information corresponds to a first network slice; An RRC recovery request message and data of the terminal device; determining that the data is data of the first network slice according to the first SDT configuration information.
  • the first network device sends SDT configuration information at the granularity of network slicing (for example, the first SDT configuration information) to the terminal device, so that the terminal device can perform SDT transmission based on network slicing according to the SDT configuration information at the granularity of network slicing ( For example, sending the data of the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • SDT configuration information at the granularity of network slicing for example, the first SDT configuration information
  • the terminal device can perform SDT transmission based on network slicing according to the SDT configuration information at the granularity of network slicing ( For example, sending the data of the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • the first SDT configuration information includes an identifier of the first network slice or the first network slice group, and the first network slice group includes the first network slice.
  • the terminal device can determine according to the identifier of the first network slice or the identifier of the first network slice group, The first SDT configuration information corresponds to the first network slice, so as to realize the SDT solution based on the network slice.
  • the method further includes: sending first indication information to the terminal device, where the first indication information is used to indicate that the first SDT configuration information and the first network corresponding to a slice or a first network slice group, and the first network slice group includes the first network slice.
  • the first network device sends the first indication information to the terminal device, so that the terminal device can determine that the first SDT configuration information corresponds to the first network slice according to the first indication information, thereby implementing a network slice-based SDT solution.
  • the first SDT configuration information corresponds to the first RB, and the first RB corresponds to the first network slice; the data is determined according to the first SDT configuration information It is the data of the first network slice, including: determining that the data is the data of the first RB according to the first SDT configuration information.
  • the SDT configuration information sent by the first network device to the terminal device may be at the RB granularity (for example, the first SDT configuration information), so that the terminal device can perform RB-based SDT transmission according to the SDT configuration information at the RB granularity (for example, Send the data of the first RB corresponding to the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • the RB granularity for example, the first SDT configuration information
  • the terminal device can perform RB-based SDT transmission according to the SDT configuration information at the RB granularity (for example, Send the data of the first RB corresponding to the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • the first SDT configuration information includes the identifier of the first RB.
  • the terminal device can determine that the first SDT configuration information corresponds to the first RB according to the first RB identifier, thereby realizing the RB-based SDT solution.
  • the method further includes: sending second indication information to the terminal device, where the second indication information is used to indicate that the first SDT configuration information and the first RB correspond.
  • the first network device sends the second indication information to the terminal device, so that the terminal device can determine that the first SDT configuration information corresponds to the first RB according to the second indication information, thereby implementing the RB-based SDT solution.
  • the method further includes: sending second SDT configuration information to the terminal device, where the second SDT configuration information corresponds to a second RB, and the second RB is different from The first RB and the second RB correspond to the first network slice, and the resource indicated by the second SDT configuration information is different from the resource indicated by the first SDT configuration information.
  • the first network device sends SDT configuration information corresponding to different RBs to the terminal device, and the resources indicated by the SDT configuration information corresponding to different RBs are different, so that the RB-based SDT solution can be implemented.
  • the first SDT configuration information includes at least one of the following information: data volume threshold, RSRP threshold, security parameters, CG time domain resources, CG frequency Domain resources, DMRS configuration of CG, identification of synchronization signal and PBCH block, search space or control resource set, preamble, random access channel time-frequency resource, PUSCH time-frequency resource, DMRS configuration of PUSCH, uplink carrier selection threshold.
  • the first SDT configuration information includes the security parameter
  • the security parameter includes the NCC
  • the method further includes: using a key to decrypt the data of the first network slice , the key is determined according to the NCC.
  • the first network device determines the key according to the NCC, and decrypts the data of the first network slice according to the key, so that a secure SDT solution based on network slice can be realized.
  • the method further includes: sending a request message to the second network device, where the request message is used to request the context of the terminal device, and the request message includes the first network Auxiliary information of the slice; receiving a response message from the second network device, where the response message includes the context of the terminal device or a tunnel address for uplink data forwarding.
  • the first network device sends the auxiliary information of the first network slice to the second network device, which helps the second network device determine whether to perform anchor relocation (anchor relocation) according to the auxiliary information of the first network slice, In this way, the SDT solution based on network slicing is realized.
  • the auxiliary information of the first network slice includes one or more of the following: the identifier of the first network slice, the first admission information, the first network slice The size of the data volume, the priority information of the first network slice, and the first admission information is used to indicate whether the first network device can accept the first network slice.
  • the method further includes: receiving third indication information from the terminal device, the third indication information indicating that data of a third network slice arrives; the request message Auxiliary information of the third network slice is also included.
  • the first network device sends the auxiliary information of the third network slice to the second network device, which helps the second network device determine whether to perform anchor relocation (anchor relocation) according to the auxiliary information of the third network slice, In this way, the SDT solution based on network slicing is realized.
  • the auxiliary information of the third network slice includes one or more of the following: second admission information, the third indication information, an identifier of the third network slice . Priority information of the third network slice, where the second admission information is used to indicate whether the first network device can admit the third network slice.
  • a communication method is provided, the method is applied to a second network device, and the method includes: receiving a request message from the first network device, where the request message is used to request the context of the terminal device, and the request message includes the first Auxiliary information of a network slice, where the first network slice is the network slice where the terminal device initiates the SDT; determine whether to perform anchor relocation according to the auxiliary information of the first network slice.
  • the first network device sends the auxiliary information of the first network slice to the second network device, which helps the second network device determine whether to perform anchor relocation according to the auxiliary information of the first network slice, thereby realizing network-based SDT scheme for slices.
  • the auxiliary information of the first network slice includes one or more of the following: the identifier of the first network slice, the first admission information, the first network slice The size of the data volume, the priority information of the first network slice, the first admission information is used to indicate whether the first network device can accept the first network slice.
  • the request message further includes auxiliary information of a third network slice, where the third network slice is a network slice where data arrives at the terminal device, and the third network slice The slice is different from the first network slice, and the determining whether to perform anchor relocation according to the auxiliary information of the first network slice includes: determining whether to perform anchor relocation according to the auxiliary information of the first network slice and the auxiliary information of the third network slice reset.
  • the first network device sends the auxiliary information of the third network slice to the second network device, which helps the second network device determine whether to perform anchor relocation according to the auxiliary information of the third network slice, thereby realizing network-based SDT scheme for slices.
  • the auxiliary information of the third network slice includes one or more of the following: second admission information, third indication information, an identifier of the third network slice, The priority information of the third network slice, the second admission information is used to indicate whether the first network device can accept the third network slice, and the third indication information indicates that data of the third network slice has arrived.
  • a communication device in a fourth aspect, includes a transceiver unit, the transceiver unit is configured to receive first SDT configuration information from a first network device, the first SDT configuration information corresponds to a first network slice; the The transceiver unit is further configured to send a radio resource control RRC recovery request message and data of the first network slice to the first network device according to the first SDT configuration information.
  • the first SDT configuration information includes an identifier of the first network slice or an identifier of a first network slice group, and the first network slice group includes the first network slice slice.
  • the transceiver unit is further configured to receive first indication information from the first network device, where the first indication information is used to indicate that the first SDT configuration information and The first network slice or the first network slice group corresponds, and the first network slice group includes the first network slice.
  • the first SDT configuration information corresponds to the first RB
  • the first RB corresponds to the first network slice
  • the data of the first network slice is the One RB of data.
  • the first SDT configuration information includes the identifier of the first RB.
  • the transceiving unit is further configured to send second indication information from the first network device, where the second indication information is used to indicate that the first SDT configuration information and the The first RB corresponds.
  • the transceiver unit is further configured to receive second SDT configuration information from the first network device, where the second SDT configuration information corresponds to the second RB, and the first The second RB is different from the first RB, and the second RB corresponds to the first network slice, and the resource indicated by the first SDT configuration information is different from the resource indicated by the second SDT configuration information.
  • the first SDT configuration information includes at least one of the following information: data volume threshold, RSRP threshold, security parameters, CG time domain resources, CG frequency Domain resource, CG DMRS configuration, synchronization signal and PBCH block identifier, search space or control resource set, preamble, random access channel time-frequency resource, PUSCH time-frequency resource of random access message A, random access message A
  • the DMRS configuration of the PUSCH and the uplink carrier selection threshold includes at least one of the following information: data volume threshold, RSRP threshold, security parameters, CG time domain resources, CG frequency Domain resource, CG DMRS configuration, synchronization signal and PBCH block identifier, search space or control resource set, preamble, random access channel time-frequency resource, PUSCH time-frequency resource of random access message A, random access message A
  • the DMRS configuration of the PUSCH and the uplink carrier selection threshold includes at least one of the following information: data volume threshold, RSRP threshold, security parameters, CG time domain resources, CG frequency Domain resource
  • the first SDT configuration information includes the data volume threshold
  • the transceiver unit is specifically configured to: when the data volume of the network slice corresponding to the first SDT configuration information When the sum is less than or equal to the data amount threshold, send the RRC recovery request message and the data of the first network slice to the first network device, and the network slice corresponding to the first SDT configuration information includes the first network slice.
  • the first SDT configuration information includes the RSRP threshold
  • the transceiver unit is specifically configured to: when at least one synchronization signal and a PBCH block corresponding to the first SDT configuration information When the RSRP is greater than or equal to the RSRP threshold, send the RRC recovery request message and the data of the first network slice to the first network device.
  • the first SDT configuration information includes the security parameter
  • the security parameter includes the NCC
  • the communication device further includes a processing unit configured to use a key pair
  • the data of the first network slice is encrypted, and the key is determined according to the NCC
  • the transceiver unit is specifically configured to send the RRC recovery request message and the encrypted data of the first network slice to the first network device.
  • the processing unit is further configured to restore the suspended RB corresponding to the first network slice or the first network slice group, where the first network slice group includes the first network slice group A network slice, the suspended RB corresponds to the data of the first network slice.
  • the processing unit is further configured not to restore the RBs corresponding to the third network slice or the third network slice group, where the third network slice is different from the first network slice , the third network slice group is different from the first network slice group.
  • the transceiver unit is further configured to send third indication information to the first network device, where the third indication information indicates that data of a third network slice arrives, the The third indication information is carried in the same message as the RRC recovery request message and the data of the first network slice.
  • the first SDT configuration information is included in an RRC release message or a system message.
  • a communication device in a fifth aspect, includes a transceiver unit and a processing unit, the transceiver unit is configured to send first SDT configuration information to a terminal device, where the first SDT configuration information corresponds to a first network slice; the The transceiver unit is further configured to receive an RRC recovery request message and data from the terminal device; the processing unit is configured to determine that the data is the data of the first network slice according to the first SDT configuration information.
  • the first SDT configuration information includes an identifier of the first network slice or the first network slice group, and the first network slice group includes the first network slice.
  • the transceiver unit is further configured to send first indication information to the terminal device, where the first indication information is used to indicate that the first SDT configuration information is related to the first The network slice corresponds to the first network slice group, and the first network slice group includes the first network slice.
  • the first SDT configuration information corresponds to the first RB, and the first RB corresponds to the first network slice; the processing unit is specifically configured to The SDT configuration information determines that the data is the data of the first RB.
  • the first SDT configuration information includes the identifier of the first RB.
  • the method further includes: sending second indication information to the terminal device, where the second indication information is used to indicate that the first SDT configuration information and the first RB correspond.
  • the transceiver unit is further configured to send second SDT configuration information to the terminal device, where the second SDT configuration information corresponds to a second RB, and the second RB is different from For the first RB, and the second RB corresponds to the first network slice, the resource indicated by the second SDT configuration information is different from the resource indicated by the first SDT configuration information.
  • the first SDT configuration information includes at least one of the following information: data volume threshold, RSRP threshold, security parameters, CG time domain resources, CG frequency Domain resources, DMRS configuration of CG, identification of synchronization signal and PBCH block, search space or control resource set, preamble, random access channel time-frequency resource, PUSCH time-frequency resource, DMRS configuration of PUSCH, uplink carrier selection threshold.
  • the first SDT configuration information includes the security parameter
  • the security parameter includes NCC
  • the processing unit is further configured to use a key to the data of the first network slice To decrypt, the key is determined according to the NCC.
  • the transceiver unit is further configured to send a request message to the second network device, where the request message is used to request the context of the terminal device, and the request message includes the first Auxiliary information of network slicing; the transceiving unit is further configured to receive a response message from the second network device, where the response message includes the context of the terminal device or the tunnel address for uplink data forwarding.
  • the auxiliary information of the first network slice includes one or more of the following: the identifier of the first network slice, the first admission information, the first network slice The size of the data volume, the priority information of the first network slice, the first admission information is used to indicate whether the communication device can accept the first network slice.
  • the transceiving unit is further configured to receive third indication information from the terminal device, where the third indication information indicates that data of a third network slice arrives; the request The message also includes auxiliary information of the third network slice.
  • the auxiliary information of the third network slice includes one or more of the following: second admission information, the third indication information, and an identifier of the third network slice .
  • a communication device includes a transceiver unit and a processing unit, the transceiver unit is used to receive a request message from the first network device, the request message is used to request the context of the terminal device, and the request message includes Auxiliary information of the first network slice, where the first network slice is the network slice where the terminal device initiates the SDT; the processing unit is configured to determine whether to perform anchor relocation according to the auxiliary information of the first network slice.
  • the auxiliary information of the first network slice includes one or more of the following: the identifier of the first network slice, the first admission information, the first network slice The size of the data volume, the priority information of the first network slice, the first admission information is used to indicate whether the first network device can accept the first network slice.
  • the request message further includes auxiliary information of a third network slice, where the third network slice is a network slice where data arrives at the terminal device, and the third network slice The slice is different from the first network slice, and the processing unit is specifically configured to determine whether to perform anchor relocation according to the auxiliary information of the first network slice and the auxiliary information of the third network slice.
  • the auxiliary information of the third network slice includes one or more of the following: second admission information, third indication information, an identifier of the third network slice, The priority information of the third network slice, the second admission information is used to indicate whether the first network device can accept the third network slice, and the third indication information indicates that data of the third network slice has arrived.
  • a communication device including a processor.
  • the processor is coupled with the memory, and may be used to execute instructions in the memory, so as to implement the method in any possible implementation manner of the above first aspect.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, the processor is coupled to the communication interface, and the communication interface is used for inputting and/or outputting information, and the information includes at least one of instructions and data.
  • the communication device is a terminal device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the communication device is a chip or a chip system configured in a terminal device.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, and the like.
  • the processor may also be embodied as a processing circuit or logic circuit.
  • a communication device including a processor.
  • the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in any possible implementation manner of the second aspect above.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, the processor is coupled to the communication interface, and the communication interface is used for inputting and/or outputting information, and the information includes at least one of instructions and data.
  • the communications apparatus is a first network device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the communication device is a chip or a chip system configured in the first network device.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit, etc.
  • the processor may also be embodied as a processing circuit or logic circuit.
  • a communication device including a processor.
  • the processor is coupled with the memory, and can be used to execute instructions in the memory, so as to implement the method in any possible implementation manner of the third aspect above.
  • the communication device further includes a memory.
  • the communication device further includes a communication interface, the processor is coupled to the communication interface, and the communication interface is used for inputting and/or outputting information, and the information includes at least one of instructions and data.
  • the communication device is a second network device.
  • the communication interface may be a transceiver, or an input/output interface.
  • the transceiver may be a transceiver circuit.
  • the input/output interface may be an input/output circuit.
  • the communication device is a chip or a chip system configured in the second network device.
  • the communication interface may be an input/output interface, an interface circuit, an output circuit, an input circuit, a pin or a related circuit and the like.
  • the processor may also be embodied as a processing circuit or logic circuit.
  • a processor including: an input circuit, an output circuit, and a processing circuit.
  • the processing circuit is configured to receive a signal through the input circuit, and transmit a signal through the output circuit, so that the processor executes any one of the first aspect to the third aspect and the first aspect to the third aspect. method in the implementation.
  • the above-mentioned processor can be a chip
  • the input circuit can be an input pin
  • the output circuit can be an output pin
  • the processing circuit can be a transistor, a gate circuit, a flip-flop, and various logic circuits.
  • the input signal received by the input circuit may be received and input by, for example but not limited to, the receiver
  • the output signal of the output circuit may be, for example but not limited to, output to the transmitter and transmitted by the transmitter
  • the circuit may be the same circuit, which is used as an input circuit and an output circuit respectively at different times.
  • the embodiment of the present application does not limit the specific implementation manners of the processor and various circuits.
  • a processing device including a communication interface and a processor.
  • the communication interface is coupled with the processor.
  • the communication interface is used for input and/or output of information.
  • the information includes at least one of instructions and data.
  • the processor is configured to execute a computer program, so that the processing device executes the method in any one possible implementation manner of the first aspect to the third aspect and the first aspect to the third aspect.
  • processors there are one or more processors, and one or more memories.
  • a processing device including a processor and a memory.
  • the processor is used to read instructions stored in the memory, and can receive signals through the receiver and transmit signals through the transmitter, so that the processing device performs any of the first to third aspects and the first to third aspects.
  • processors there are one or more processors, and one or more memories.
  • the memory may be integrated with the processor, or the memory may be set separately from the processor.
  • the memory can be a non-transitory (non-transitory) memory, such as a read-only memory (read only memory, ROM), which can be integrated with the processor on the same chip, or can be respectively arranged in different On the chip, the embodiment of the present application does not limit the type of the memory and the configuration of the memory and the processor.
  • a non-transitory memory such as a read-only memory (read only memory, ROM)
  • ROM read only memory
  • sending indication information may be a process of outputting indication information from a processor
  • receiving indication information may be a process of inputting received indication information to a processor.
  • the processed output information may be output to the transmitter, and the input information received by the processor may be from the receiver.
  • the transmitter and receiver can be collectively referred to as a transceiver.
  • the device in the eleventh aspect and the twelfth aspect above may be a chip, and the processor may be implemented by hardware or software, and when implemented by hardware, the processor may be a logic circuit, an integrated circuit, etc.;
  • the processor can be a general-purpose processor, and can be implemented by reading software codes stored in a memory, and the memory can be integrated in the processor, or it can be located outside the processor and exist independently.
  • a computer program product including: a computer program (also referred to as code, or an instruction), when the computer program is executed, the computer executes the above-mentioned first aspect to The third aspect and the method in any possible implementation manner of the first aspect to the third aspect.
  • a computer program also referred to as code, or an instruction
  • a computer-readable medium stores a computer program (also referred to as code, or instruction) when it is run on a computer, so that the computer executes the above-mentioned first aspect to The third aspect and the method in any possible implementation manner of the first aspect to the third aspect.
  • a computer program also referred to as code, or instruction
  • a fifteenth aspect provides a communication system, including the aforementioned terminal device and the first network device, or including the aforementioned terminal device, the first network device, and the second network device.
  • FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of another network architecture provided by an embodiment of the present application.
  • Fig. 3 is a schematic diagram of an application scenario of a technical solution provided by an embodiment of the present application.
  • Fig. 4 is a schematic flowchart of a communication method provided by an embodiment of the present application.
  • Fig. 5 is a schematic flowchart of a communication method provided by another embodiment of the present application.
  • Fig. 6 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • Fig. 7 is a schematic block diagram of a communication device provided by another embodiment of the present application.
  • FIG. 8 is a schematic diagram of a chip system provided by an embodiment of the present application.
  • the technical solution of the embodiment of the present application can be applied to various communication systems, for example: long term evolution (long term evolution, LTE) system, LTE frequency division duplex (frequency division duplex, FDD) system, LTE time division duplex (time division duplex) , TDD), Universal Mobile Telecommunications System (UMTS), Worldwide Interoperability for Microwave Access (WiMAX) Communication System, 5th Generation (5G) System, New Radio , NR) etc.
  • LTE long term evolution
  • LTE frequency division duplex frequency division duplex
  • FDD frequency division duplex
  • time division duplex time division duplex
  • TDD Time division duplex
  • UMTS Universal Mobile Telecommunications System
  • WiMAX Worldwide Interoperability for Microwave Access
  • 5G 5th Generation
  • New Radio New Radio
  • the communication system may also be a public land mobile network (PLMN), a device-to-device (D2D) communication system, a machine-to-machine (M2M) communication system, an Internet of Things ( Internet of things, IoT) communication system or other communication systems.
  • PLMN public land mobile network
  • D2D device-to-device
  • M2M machine-to-machine
  • IoT Internet of Things
  • the terminal equipment in the embodiment of the present application may refer to an unmanned aerial vehicle (UAV), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a relay station, a remote station, a remote terminal, a mobile equipment, user terminal (user terminal), user equipment (user equipment, UE), terminal (terminal), wireless communication device, user agent, or user device.
  • UAV unmanned aerial vehicle
  • the terminal device can also be a cellular phone, a cordless phone, a session initiation protocol (session initiation protocol, SIP), a wireless local loop (wireless local loop, WLL) station, a personal digital assistant (personal digital assistant, PDA), a wireless communication function Handheld devices, computing devices or other processing devices connected to wireless modems, vehicle-mounted devices, wearable devices, terminal devices in 5G networks, terminal devices in future evolved PLMNs, or terminal devices in future Internet of Vehicles, etc., this application The embodiment does not limit this.
  • wearable devices can also be referred to as wearable smart devices, which is a general term for intelligently designing daily wear and developing wearable devices by applying wearable technology, such as glasses, Gloves, watches, clothing and shoes, etc.
  • a wearable device is a portable device that is worn directly on the body or integrated into the user's clothing or accessories. Wearable devices are not only a hardware device, but also achieve powerful functions through software support, data interaction, and cloud interaction.
  • Generalized wearable smart devices include full-featured, large-sized, complete or partial functions without relying on smart phones, such as smart watches or smart glasses, etc., and only focus on a certain type of application functions, and need to cooperate with other devices such as smart phones Use, such as various smart bracelets and smart jewelry for physical sign monitoring.
  • the terminal device can also be the terminal device in the IoT system.
  • IoT is an important part of the development of information technology in the future. Its main technical feature is to connect items to the network through communication technology, so as to realize Interconnection, an intelligent network that interconnects things.
  • the IOT technology can achieve massive connections, deep coverage, and terminal power saving through, for example, narrow band (NB) technology.
  • NB narrow band
  • the terminal equipment may also include sensors such as smart printers, train detectors, gas stations, etc., and its main functions include collecting data (part of terminal equipment), receiving control information and downlink data of access network equipment, and Send electromagnetic waves to transmit uplink data to access network equipment.
  • sensors such as smart printers, train detectors, gas stations, etc.
  • its main functions include collecting data (part of terminal equipment), receiving control information and downlink data of access network equipment, and Send electromagnetic waves to transmit uplink data to access network equipment.
  • the device used to realize the function of the terminal device may be a terminal device, or a device capable of supporting the terminal device to realize the function, such as a chip system or a combined device or component that can realize the function of the terminal device. Can be installed in terminal equipment.
  • the system-on-a-chip may be composed of chips, or may include chips and other discrete devices.
  • the access network device in the embodiment of the present application may be any communication device with a wireless transceiver function for communicating with a terminal device.
  • the equipment includes but is not limited to: evolved Node B (evolved Node B, eNB), radio network controller (radio network controller, RNC), Node B (Node B, NB), base station controller (base station controller, BSC) , base transceiver station (base transceiver station, BTS), home base station (home evolved NodeB, HeNB, or home Node B, HNB), baseband unit (baseBand unit, BBU), wireless fidelity (wireless fidelity, WIFI) system Access point (access point, AP), wireless relay node, wireless backhaul node, transmission point (transmission point, TP) or transmission and reception point (transmission and reception point, TRP), etc., can also be a 5G system, such as, A gNB in an NR system, or a transmission point (TRP or TP), one or a group (including multiple antenna panels
  • the device for realizing the function of the access network device may be the access network device, or a device capable of supporting the access network device to realize the function, such as a chip system or a device capable of realizing the function of the access network device Combination devices and components, the device can be installed in the access network equipment.
  • the technical solution provided by the embodiment of the present application the technical solution provided by the embodiment of the present application is described by taking the access network device as an example for realizing the function of the access network device.
  • the interface between the access network device and the terminal device may be a Uu interface (or called an air interface).
  • the names of these interfaces may remain unchanged, or may be replaced by other names, which is not limited in this application.
  • the communication between the access network device and the terminal device follows a certain protocol layer structure, for example, the control plane protocol layer structure may include a radio resource control (radio resource control, RRC) layer, a packet data convergence layer protocol (packet data Convergence protocol, PDCP) layer, radio link control (radio link control, RLC) layer, media access control (media access control, MAC) layer and physical layer;
  • the user plane protocol layer structure can include PDCP layer, RLC layer, MAC layer
  • a service data adaptation protocol (service data adaptation protocol, SDAP) layer may also be included above the PDCP layer.
  • An access network device may have one node implement functions of protocol layers such as RRC, PDCP, RLC, and MAC, or multiple nodes may implement functions of these protocol layers.
  • an access network device may include one or more centralized units (centralized unit, CU) and one or more distributed units (distributed unit, DU), and multiple DUs may be centrally controlled by one CU .
  • the interface between the CU and the DU may be called an F1 interface, where a control plane (control panel, CP) interface may be F1-C, and a user plane (user panel, UP) interface may be F1-U.
  • the CU and DU can be divided according to the protocol layer of the wireless network: for example, as shown in FIG. 1 , FIG. 1 is a schematic diagram of a network architecture provided by an embodiment of the present application.
  • the functions of the PDCP layer and above protocol layers are set in the CU, and the functions of the protocol layers below the PDCP layer (such as RLC layer and MAC layer, etc.) are set in the DU.
  • the above division of the processing functions of CU and DU according to the protocol layer is only an example, and may also be divided in other ways, for example, the functions of the protocol layers above the RLC layer are set in the CU, the RLC layer and the following protocol layers
  • the functions of the DU are set in the DU, and for example, the CU or DU can be divided into functions with more protocol layers, and for example, the CU or DU can also be divided into partial processing functions with protocol layers.
  • part of the functions of the RLC layer and the functions of the protocol layers above the RLC layer are set in the CU, and the rest of the functions of the RLC layer and the functions of the protocol layers below the RLC layer are set in the DU.
  • the functions of the CU or DU can also be divided according to the business type or other system requirements, for example, according to the delay, and the functions whose processing time needs to meet the delay requirement are set in the DU, which does not need to meet the delay
  • the required feature set is in the CU.
  • the CU may also have one or more functions of the core network.
  • the CU can be set on the network side to facilitate centralized management; the DU can have multiple radio functions, or the radio functions can be remotely set. This embodiment of the present application does not limit it.
  • FIG. 2 is a schematic diagram of another network architecture provided by an embodiment of the present application.
  • the functions of the CU can be further divided, that is, the control plane and the user plane are separated and realized by different entities, which are respectively the control plane CU entity (ie, the CU-CP entity) and the user plane CU entity ( That is, the CU-UP entity), the CU-CP entity and the CU-UP entity can be coupled with the DU to jointly complete the functions of the access network device.
  • the control plane CU entity ie, the CU-CP entity
  • the user plane CU entity That is, the CU-UP entity
  • the CU-CP entity and the CU-UP entity can be coupled with the DU to jointly complete the functions of the access network device.
  • the interface between CU-CP entity and CU-UP entity can be E1 interface
  • the interface between CU-CP entity and DU can be F1-C interface
  • the interface between CU-UP entity and DU can be F1-U interface.
  • one DU and one CU-UP can be connected to one CU-CP.
  • one DU can be connected to multiple CU-UPs
  • one CU-UP can be connected to multiple DUs.
  • the signaling generated by the CU can be sent to the terminal device through the DU, or the signaling generated by the terminal device can be sent to the CU through the DU.
  • the DU can directly encapsulate the signaling through the protocol layer and transparently transmit it to the terminal device or CU without parsing the signaling.
  • the sending or receiving of the signaling by the DU includes this scenario.
  • signaling at the RRC or PDCP layer will eventually be processed as data at the physical layer and sent to the terminal device, or converted from received data at the physical layer.
  • the signaling at the RRC or PDCP layer can also be considered to be sent by the DU, or sent by the DU and the radio frequency device.
  • the access network device mentioned in the embodiment of this application may be a device including CU, or DU, or a device including CU and DU, or a control plane CU node (CU-CP node) and a user plane CU node (CU-UP node) And the equipment of DU node.
  • CU-CP node control plane CU node
  • CU-UP node user plane CU node
  • the access network device and the terminal device include a hardware layer, an operating system layer running on the hardware layer, and an application layer running on the operating system layer.
  • the hardware layer includes hardware such as a central processing unit (CPU), a memory management unit (MMU), and memory (also called main memory).
  • the operating system may be any one or more computer operating systems that implement business processing through processes, for example, Linux operating system, Unix operating system, Android operating system, iOS operating system, or windows operating system.
  • the application layer includes applications such as browsers, address books, word processing software, and instant messaging software.
  • various aspects or features of the present application may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques.
  • article of manufacture covers a computer program accessible from any computer readable device, carrier or media.
  • computer-readable media may include, but are not limited to: magnetic storage devices (e.g., hard disk, floppy disk, or tape, etc.), optical disks (e.g., compact disc (compact disc, CD), digital versatile disc (digital versatile disc, DVD) etc.), smart cards and flash memory devices (for example, erasable programmable read-only memory (EPROM), card, stick or key drive, etc.).
  • magnetic storage devices e.g., hard disk, floppy disk, or tape, etc.
  • optical disks e.g., compact disc (compact disc, CD), digital versatile disc (digital versatile disc, DVD) etc.
  • smart cards and flash memory devices for example, erasable programmable read-only memory (EPROM), card, stick or key drive, etc.
  • various storage media described herein can represent one or more devices and/or other machine-readable media for storing information.
  • the term "machine-readable storage medium” may include, but is not limited to, wireless channels and various other media capable of storing, containing and/or carrying instructions and/or data.
  • Fig. 3 is a schematic diagram of the application scenario of the technical solution provided by the embodiment of the present application.
  • the terminal device 330 accesses the wireless network to obtain the service of the external network (such as the Internet) through the wireless network, or through the wireless network Communicate with other end devices.
  • the wireless network includes a radio access network (radio access network, RAN) 310 and a core network (core network, CN) 320, wherein the RAN 310 is used to connect the terminal device 330 to the wireless network, and the CN 320 is used to connect the terminal device Manage and provide a gateway for communication with the external network.
  • radio access network radio access network
  • CN core network
  • the method for transmitting data provided in this application may be applicable to a wireless communication system, for example, the wireless communication system 100 shown in FIG. 3 .
  • a wireless communication connection between two communication devices in the wireless communication system one of the two communication devices may correspond to the terminal device 330 shown in FIG. 3 , for example, it may be the terminal device 330 in FIG. 3 , may also be a chip configured in the terminal device 330; the other communication device in the two communication devices may correspond to the RAN 310 shown in FIG. 3 , for example, may be the RAN 310 in FIG. 3 , or may be A chip configured in the RAN 310.
  • a terminal device in radio resource control connected (RRC CONNECTED) state means that an RRC connection has been established between the terminal device and the access network device, and the access network device stores the information of the terminal device (for example, the information of the terminal device One or more of access layer context information, wireless configuration information, etc.).
  • the RRC connection is a dedicated connection such as a data radio bearer (data radio bearer, DRB) or a signaling radio bearer 1 (signal radio bearer, SRB1) connection, excluding the public connection of SRB0;
  • a terminal device in the radio resource control idle (RRC IDLE) state means that there is no RRC connection between the terminal device and the access network device, and the access network device does not save the information of the terminal device;
  • a terminal device in the radio resource control inactive (RRC INACTIVE) state means that the terminal device moves under the notification area based on the radio access network (radio access network based notification area, RNA). network access equipment.
  • the terminal device saves its own context, and the last serving gNB saves the context of the terminal device, and it is related to the access and mobility management function (access and mobility management function, AMF) and the user plane function (user plane function, UPF) next generation (next generation, NG) connection.
  • AMF access and mobility management function
  • UPF user plane function
  • NG next generation
  • 5G provides users with customized network services through end-to-end network slicing. Specifically, 5G virtualizes multiple Logical subnets with different characteristics and isolated from each other provide targeted services to users.
  • Each S-NSSAI can include the following content: (1) slice/service type (slice/service type, SST), pointing to slice-specific characteristics and service types; (2) slice differentiator (slice differentiator, SD), as SST It can further distinguish multiple network slice instances satisfying the same SST.
  • Small data transmission also known as early data transmission (EDT), for a UE in a non-connected state (that is, RRC IDLE or RRC INACTIVE), a simple signaling process can be used Small data transmission (for example, automatic reporting of water meters) is performed to avoid RRC state changes and overhead of RRC signaling.
  • EDT early data transmission
  • the way for the terminal device to perform decimal transmission includes configured grant (configured grant, CG)-SDT and random access (random access, RA)-SDT.
  • the present application provides a communication method in order to realize SDT based on network slicing, so as to meet the needs of different consumers.
  • the terminal equipment shown in the following embodiments can be replaced with components configured in the terminal equipment (such as chips or circuits, etc.), and the network equipment shown in the following embodiments can be replaced with components configured in the network equipment (such as chips or circuits, etc.) ).
  • the embodiments shown below do not specifically limit the specific structure of the execution subject of the method provided by the embodiment of the present application, as long as the program that records the code of the method provided by the embodiment of the present application can be executed according to the method provided by the embodiment of the present application The method only needs to communicate.
  • the execution subject of the method provided by the embodiment of the present application may be a terminal device and a network device, or a functional module in the terminal device and/or network device that can call a program and execute the program.
  • “for indicating” can be understood as “enabling”.
  • “Enabling” may include direct enabling and indirect enabling. When describing a certain information for enabling A, it may include that the information directly enables A or indirectly enables A, but it does not mean that A must be carried in the information.
  • the information enabled by the information is called the information to be enabled.
  • the information to be enabled can be directly enabled, such as to be enabled The information itself or the index of the information to be enabled, etc.
  • the to-be-enabled information may also be indirectly enabled by enabling other information, where there is an association relationship between the other information and the to-be-enabled information. It is also possible to enable only a part of the information to be enabled, while other parts of the information to be enabled may be known or agreed in advance.
  • specific information can also be enabled by means of a pre-agreed (for example, protocol-specified) arrangement order of each information, thereby reducing the enabling overhead to a certain extent.
  • a pre-agreed arrangement order of each information for example, protocol-specified
  • common parts of each information can be identified and enabled uniformly, so as to reduce the enabling overhead caused by enabling the same information separately.
  • the "storage" mentioned in the embodiment of the present application may refer to storage in one or more memories.
  • the one or more memories may be provided independently, or may be integrated in an encoder or decoder, a processor, or a communication device.
  • the one or more memories may also be a part of an independent device, and a part of it is integrated in a decoder, a processor, or a communication device.
  • the type of the storage may be any form of storage medium, which is not limited in this application.
  • Fig. 4 is a schematic flowchart of a communication method provided by an embodiment of the present application. As shown in FIG. 4, the method 400 may include S410 and S420, and each step in the method 400 will be described in detail below.
  • the first network device sends first SDT configuration information, where the first SDT configuration information corresponds to the first network slice.
  • the terminal device receives first SDT configuration information.
  • the first network device is a currently serving network device. That is to say, the terminal device is within the coverage of the first network device.
  • the first network device may have established an RRC connection with the terminal device, or may not have established an RRC connection with the terminal device, which is not limited in this embodiment of the present application.
  • the first SDT configuration information includes at least one of the following information: data amount threshold #1, reference signal received power (reference signal received power, RSRP) threshold #1, security parameter #1, time domain resource #1 of CG, CG frequency domain resource #1, CG demodulation reference signal (demodulation reference signal, DMRS) configuration #1, synchronization signal and physical broadcast channel block (synchronous signal and physical broadcast channel block, SSB) #1 identification, search space ( search space) #1 or control resource set (CORESET) #1, preamble (preamble) #1, random access channel time-frequency resources (random access channel occasions) #1, RA message A (message A, MSGA) physical uplink shared channel (physical uplink shared channel, PUSCH) time-frequency resource #1, RA MSGA PUSCH DMRS configuration #1, uplink carrier selection threshold (uplink carrier selection threshold) #1.
  • data amount threshold #1 reference signal received power (reference signal received power, RSRP) threshold #1
  • security parameter #1 time domain resource #1 of CG, CG frequency domain resource #1, CG
  • data volume threshold #1, RSRP threshold #1, security parameter #1, SSB #1 identifier, search space #1 or control resource set #1, and uplink carrier selection threshold #1 can be used for CG-SDT and RA- SDT (including two-step (2step) random access and four-step (4step) random access).
  • the time domain resource #1 of the CG, the frequency domain resource #1 of the CG, and the DMRS configuration #1 of the CG are dedicated to the CG-SDT.
  • DMRS configuration #1 of the CG may include DMRS sequences and/or DMRS ports.
  • Preamble #1, random access channel time-frequency resource #1, RA MSGA PUSCH time-frequency resource #1, RA MSGA PUSCH DMRS configuration #1 are dedicated to RA-SDT.
  • the PUSCH time-frequency resource #1 of the RA MSGA is dedicated to two-step random access, and is a resource for sending the payload of the MSGA.
  • the DMRS configuration #1 of PUSCH of RA MSGA is dedicated to two-step random access and is used to send the configuration of DMRS of MSGA.
  • Preamble #1 and random access channel time-frequency resource #1 can be used for two-step random access and four-step random access.
  • the first network device may send the first SDT configuration information to the terminal device through an RRC release (release) message. That is to say, the first network device carries the first SDT configuration information in the RRC release message and sends it to the terminal device.
  • the RRC release message sent by the first network device to the terminal device includes a suspend (suspend) configuration
  • the suspension configuration includes first SDT configuration information.
  • the terminal device suspends the radio bearer (radio bearer, RB) and enters the RRC deactivation state.
  • the RBs suspended by the terminal device include all DRBs, SRB1, and SRB2, regardless of SRB0.
  • the first network device may send the first SDT configuration information to the terminal device through a system message.
  • the terminal equipment being in the non-connected state includes the terminal equipment being in the RRC INACTIVE state or the RRC IDLE state.
  • the embodiment of the present application does not limit the manner in which the first network device indicates that the first SDT configuration information corresponds to the first network slice.
  • the first SDT configuration information sent by the first network device to the terminal device includes the identifier of the first network slice.
  • the terminal device may determine that the first SDT configuration information corresponds to the first network slice according to the identifier of the first network slice included in the first SDT configuration information.
  • the first SDT configuration information sent by the first network device to the terminal device includes an identifier of the first network slice group, where the first network slice group includes the first network slice.
  • the terminal device may determine that the first SDT configuration information corresponds to the first network slice group according to the identifier of the first network slice group included in the first SDT configuration information. Further, the terminal device determines that the first SDT configuration information corresponds to the first network slice included in the first network slice group. It should be understood that, in a case where the first SDT configuration information corresponds to the first network slice group, it may be considered that the first SDT configuration information corresponds to all network slices included in the first network slice group.
  • the first network device may send the identifier of the network slice included in the first network slice group to the terminal device, so that the terminal device determines the first Which network slices the SDT configuration information corresponds to.
  • the first network device sends first indication information to the terminal device, where the first indication information is used to indicate that the first SDT configuration information corresponds to the first network slice.
  • the terminal device may determine that the first SDT configuration information corresponds to the first network slice.
  • the first indication information includes an index of the first SDT configuration information and an identifier of the first network slice.
  • the first indication information is used to indicate that the first SDT configuration information corresponds to the first network slice group, and the first network slice group includes the first network slice.
  • the terminal device may determine that the first SDT configuration information corresponds to the first network slice group. Further, the terminal device determines that the first SDT configuration information corresponds to the first network slice included in the first network slice group.
  • the first indication information includes an index of the first SDT configuration information and an identifier of the first network slice group.
  • the first SDT configuration information and the first indication information may be carried in the same message and sent to the terminal device, or may be carried in different messages and sent to the terminal device, which is not limited in this embodiment of the present application.
  • the first SDT configuration information also corresponds to a second network slice or a second network slice group, and the second network slice does not belong to the first network slice group. That is to say, the first SDT configuration information may correspond to multiple network slices, and the multiple network slices do not belong to the same network slice group. Alternatively, the first SDT configuration information may correspond to multiple network slice groups. Alternatively, the first SDT configuration information may correspond to a network slice and a network slice group, for example, the first SDT configuration information corresponds to a first network slice and a second network slice group, and the first network slice does not belong to the second network slice group.
  • the first SDT configuration information corresponds to the first RB.
  • the first RB corresponds to the first network slice.
  • the first RB is one or more RBs among all RBs corresponding to the first network slice.
  • the first network slice corresponds to RB#1 to RB#3, then the first RB may be RB#1, or the first RB is RB#2, or the first RB is RB#3, or the first RB is RB #1 and RB#2, or the first RBs are RB#1 and RB#3, or the first RBs are RB#2 and RB#3, or the first RBs are RB#1 to RB#3.
  • the embodiment of the present application does not limit how the first network device indicates that the first SDT configuration information corresponds to the first RB.
  • the first SDT configuration information sent by the first network device to the terminal device includes the identifier of the first RB.
  • the terminal device may determine that the first SDT configuration information corresponds to the first RB according to the identifier of the first RB included in the first SDT configuration information.
  • the first indication information may be used to indicate the correspondence between the identity of the first RB and the identity of the first network slice, for example, the first indication information It may include the identifier of the first RB and the identifier of the first network slice.
  • the terminal device determines that the first SDT configuration information corresponds to the first RB according to the identifier of the first RB included in the first SDT configuration information. The terminal device then determines that the first SDT configuration information corresponds to the first network slice according to the correspondence between the identifier of the first RB and the identifier of the first network slice.
  • the first network device sends second indication information to the terminal device, where the second indication information is used to indicate that the first SDT configuration information corresponds to the first RB.
  • the terminal device may determine that the first SDT configuration information corresponds to the first RB.
  • the second indication information includes an index of the first SDT configuration information and an identifier of the first RB.
  • the second indication information includes a correspondence between the identifier of the first RB and the identifier of the first network slice.
  • the terminal device may default that the first SDT configuration information corresponds to all RBs corresponding to the first network slice.
  • the RBs corresponding to the first network slice include RB#1 to RB#3, and if the first network device does not indicate to the terminal device that the first SDT configuration information corresponds to the first RB, the terminal device can default to the first SDT configuration The information corresponds to RB#1 to RB#3.
  • the first network device may indicate to the terminal device the correspondence between the first SDT configuration information, the first network slice, and the first RB in the following four ways.
  • the first SDT configuration information sent by the first network device to the terminal device includes the identifier of the first network slice and the identifier of the first RB.
  • the first SDT configuration information sent by the first network device to the terminal device includes the identifier of the first network slice, and the first network device sends second indication information to the terminal device.
  • the first SDT configuration information sent by the first network device to the terminal device includes the identifier of the first RB, and the first network device sends the first indication information to the terminal device.
  • Mode 4 The first network device sends the first indication information and the second indication information to the terminal device.
  • the first SDT configuration information corresponds to a first quality of service (quality of service, QoS) flow (flow).
  • the first QoS flow corresponds to the first RB, and the first QoS flow is one or more QoS flows in all QoS flows corresponding to the first RB.
  • the first RB corresponds to QoS flow #1 and QoS flow #2, then the first QoS flow may be QoS flow #1, or the first QoS flow is QoS flow #2, or the first QoS flow is QoS flow #1 and QoS flow #2.
  • the embodiment of the present application does not limit the manner in which the first network device indicates that the first SDT configuration information corresponds to the first QoS flow.
  • the first SDT configuration information sent by the first network device to the terminal device includes the identifier of the first QoS flow.
  • the terminal device may determine that the first SDT configuration information corresponds to the first QoS flow according to the identifier of the first QoS flow included in the first SDT configuration information.
  • the first network device sends fourth indication information to the terminal device, where the fourth indication information is used to indicate that the first SDT configuration information corresponds to the first QoS flow.
  • the terminal device may determine that the first SDT configuration information corresponds to the first QoS flow.
  • the method 400 further includes: the first network device sending second SDT configuration information.
  • the terminal device receives the second SDT configuration information.
  • the first network device may send the first SDT configuration information and the second SDT configuration information to the terminal device in the same message, or send them to the terminal device in different messages, which is not limited in this application.
  • the second SDT configuration information includes at least one of the following information: data amount threshold #2, RSRP threshold #2, security parameter #2, CG time domain resource #2, CG frequency domain resource #2, CG DMRS configuration #2, identification of SSB#2, search space #2 or control resource set #2, preamble #2, random access channel time-frequency resource #2, PUSCH time-frequency resource #2 of RA MSGA, and PUSCH of RA MSGA DMRS configuration #2, uplink carrier selection threshold #2.
  • the second SDT configuration information corresponds to the second RB, the second RB corresponds to the first network slice, and the second RB is different from the first RB.
  • the first network slice corresponds to RB#1 to RB#3, the first RB is RB#1, and the second RB is RB#2 and/or RB#3.
  • the first RB is RB#2, and the second RB is RB#1 and/or RB#3.
  • the first RB is RB#3, and the second RB is RB#1 and/or RB#2.
  • the first RBs are RB#1 and RB#2, and the second RB is RB#3.
  • the first RBs are RB#1 and RB#3, and the second RB is RB#2.
  • the first RBs are RB#2 and RB#3, and the second RB is RB#1.
  • the second SDT configuration information since the second RB corresponds to the first network slice, if the second SDT configuration information corresponds to the second RB, the second SDT configuration information also corresponds to the first network slice.
  • the first network device indicates that the second SDT configuration information corresponds to the first network slice and the second RB, refer to the manner in which the first SDT configuration information corresponds to the first network slice and the first RB.
  • the resource indicated by the second SDT configuration information is different from the resource indicated by the first SDT configuration information.
  • the time domain resource #2 of the CG is different from the time domain resource #1 of the CG (for example, the resource period is different), and/or the frequency domain resource #2 of the CG is different from the frequency domain resource #1 of the CG.
  • the random access channel time-frequency resource #2 is different from the random access channel time-frequency resource #1
  • the PUSCH time-frequency resource #2 of the RA MSGA is different from the PUSCH time-frequency resource #1 of the RA MSGA.
  • the data volume threshold #1 is different from the data volume threshold #2, and/or, the RSRP threshold #1 is different from the RSRP threshold #2, and/or, the security parameter #1 is different from the security parameter #2, and/or, the SSB #1 is different from SSB#2, and/or, search space #1 is different from search space #2, and/or, control resource set #1 is different from control resource set #2, and/or, preamble #1 is different from preamble
  • the code #2 is different, and/or, the uplink carrier selection threshold #1 is different from the uplink carrier selection threshold #2.
  • the method 400 further includes: the first network device sending third SDT configuration information.
  • the terminal device receives the third SDT configuration information.
  • the first network device may send the first SDT configuration information and the third SDT configuration information to the terminal device in the same message, or send them to the terminal device in different messages, which is not limited in this application.
  • the third SDT configuration information includes at least one of the following information: data amount threshold #3, RSRP threshold #3, security parameter #3, CG time domain resource #3, CG frequency domain resource #3, CG DMRS configuration #3, SSB#3 identifier, search space #3 or control resource set #3, preamble #3, random access channel time-frequency resource #3, RA MSGA PUSCH time-frequency resource #3, RA MSGA PUSCH DMRS configuration #3, uplink carrier selection threshold #3.
  • the third SDT configuration information corresponds to the third network slice or the third network slice group.
  • the third network slice is different from the first network slice
  • the third network slice group is different from the first network slice group.
  • the first network device indicates that the third SDT configuration information corresponds to the third network slice or the third network slice group
  • the resources indicated by the third SDT configuration information are different from the resources indicated by the first SDT configuration information.
  • other information included in the third SDT configuration information may also be different from the first SDT configuration information. Specifically, reference may be made to the above description of the relationship between the first SDT configuration information and the second SDT configuration information.
  • the first SDT configuration information, the second SDT configuration information, and the third SDT configuration information are all SDT configuration information dedicated to network slices or network slice groups. If the first network device sends the first SDT configuration information, For the second SDT configuration information and the third SDT configuration information, among the first SDT configuration information, the second SDT configuration information and the third SDT configuration information, resources indicated by any two SDT configuration information are different.
  • any two SDTs in the multiple SDT configuration information The resources indicated by the configuration information are different.
  • the first network device sends SDT configuration information #1 to SDT configuration information #4 to the terminal device.
  • SDT configuration information #1 corresponds to network slice #1
  • SDT configuration information #2 corresponds to network slice group #1
  • SDT configuration information #1 corresponds to network slice group #1.
  • Information #3 corresponds to RB#1 corresponding to network slice #2
  • SDT configuration information #4 corresponds to RB#2 corresponding to network slice #2, then any two SDT configuration information in SDT configuration information #1 to SDT configuration information #4 The indicated resource is different.
  • the terminal device sends an RRC resume request (RRC resume request) message and data of the first network slice.
  • RRC resume request RRC resume request
  • the terminal device sends the RRC recovery request message and the data of the first network slice to the first network device according to the first SDT configuration information.
  • the first network device receives the RRC recovery request message and the data of the first network slice.
  • the first network device may determine according to the first SDT configuration information that the data received from the terminal device is data of the first network slice.
  • the resource that the first network device receives data is the resource indicated by the first SDT configuration information, then the first network device determines that the received data is the data of the first network slice.
  • S420 is described by taking the terminal device sending data of the first network slice to the first network device according to the first SDT configuration information as an example. Send the data of the network slice corresponding to the first SDT configuration information.
  • the terminal device sends an RRC recovery request message and data of the first network slice group to the first network device.
  • the first network slice group includes the first network slice
  • the data of the first network slice group includes the data of the first network slice.
  • the first network device determines according to the first SDT configuration information that the data received from the terminal device is the data of the first network slice group.
  • the data of the first network slice group includes data of one or more network slices in the first network slice group.
  • the terminal device sends the RRC recovery request message, the data of the first network slice, and the second network slice group to the first network device.
  • the first network device may determine according to the first SDT configuration information that the data received from the terminal device is data of the first network slice and data of the second network slice/data of the second network slice group.
  • the terminal device sends an RRC recovery request message and data of the first RB to the first network device.
  • the first RB corresponds to the first network slice.
  • the first network device determines according to the first SDT configuration information that the data received from the terminal device is the data of the first RB.
  • the RRC recovery request message includes the identification of the terminal device and security verification parameters, which are used to verify the identity of the terminal device.
  • the identifier of the terminal device may be an inactive-radio network temporary identifier (inactive radio network temporary identify, I-RNTI).
  • the security verification parameter may be a short resume message authentication code for integrity (short resume MAC-I).
  • the terminal device determines that the data of the first network slice arrives, and the terminal device determines to initiate the SDT process, for example, the data of the first network slice will be sent to the first network device, and the terminal device restores the data corresponding to the first network slice or the first network slice group Suspend RB. Specifically, the terminal device restores the suspended RB corresponding to the data of the first network slice.
  • the suspended RBs corresponding to the first network slice or the first network slice group include RB#1 ⁇ RB#3
  • the suspended RBs corresponding to the data of the first network slice include RB#1 and RB#2, then the terminal device RB#1 and RB#2 are restored, and RB#3 may not be restored.
  • the terminal device does not restore the corresponding suspended RB of the third network slice or the third network slice group, the third network slice is different from the first network slice, and the third network slice group is different from the first network slice Group. That is to say, during the process of initiating the SDT, the terminal device only restores the suspended RB corresponding to the network slice with data transmission, but does not restore the suspended RB corresponding to the network slice without data transmission.
  • the manner in which the terminal device sends the RRC recovery request message and the data of the first network slice to the first network device according to the first SDT configuration information is also different.
  • the first SDT configuration information includes data volume threshold #1.
  • the terminal device when the sum of the data volumes of the network slices corresponding to the first SDT configuration information is less than or equal to the data volume threshold #1, the terminal device sends the RRC recovery request message and the data of the first network slice to the first network device. It should be understood that the network slice corresponding to the first SDT configuration information includes the first network slice.
  • the sum of data volumes of network slices corresponding to the first SDT configuration information may be understood as the sum of data volumes of network slices corresponding to the first SDT configuration information and having data arriving at the terminal device.
  • the first SDT configuration information corresponds to network slice #1 (that is, the first network slice) to network slice #3. If data from network slice #1 and network slice #2 arrive at the terminal device, the When the sum of the data volume of the network slice #2 and the data volume is less than or equal to the data volume threshold #1, the terminal device sends the data of the network slice #1 to the first network device. Optionally, the terminal device sends the data of network slice #1 and network slice #2 to the first network device.
  • the first SDT configuration information corresponds to the first network slice.
  • the terminal device when the data amount of the first network slice is less than or equal to the data amount threshold #1, the terminal device sends an RRC recovery request message and the data of the first network slice to the first network device.
  • the first SDT configuration information corresponds to the first network slice and the second network slice.
  • the terminal device when the sum of the data volumes of the first network slice and the second network slice is less than or equal to the data volume threshold #1, the terminal device sends an RRC recovery request message and data of the first network slice to the first network device.
  • the terminal device sends the RRC recovery request message, the data of the first network slice, and the data of the second network slice to the first network device.
  • the terminal device sends an RRC recovery request message and the first Data for network slices.
  • the first SDT configuration information corresponds to the first network slice group.
  • the terminal device when the data volume of the first network slice group is less than or equal to the data volume threshold #1, the terminal device sends the RRC recovery request message and the data of the first network slice to the first network device.
  • the data volume of the first network slice group is the sum of the data volumes of the network slices included in the first network slice group.
  • the terminal device sends the data of the first network slice group and the RRC recovery request message to the first network device, where the data of the first network slice group includes the data of the first network slice.
  • the terminal device sends an RRC recovery request message and the first Data for network slices.
  • the terminal device uses a non-network slice (non-slice) dedicated random access configuration to send an RRC recovery request information. Further, after the random access is completed, the terminal device sends the data of the first network slice to the first network device.
  • non-network slice non-slice
  • the first SDT configuration information includes RSRP threshold #1.
  • the terminal device sends an RRC recovery request message and data of the first network slice to the first network device.
  • the network slice corresponding to the first SDT configuration information includes the first network slice. The terminal device determines whether to trigger the SDT process according to the RSRP of at least one SSB corresponding to the first SDT configuration information, which can realize the isolation of network slices under different SSBs, so as to meet the needs of different users.
  • At least one SSB corresponding to the first SDT configuration information is an SSB corresponding to a network slice corresponding to the first SDT configuration information.
  • the first SDT configuration information corresponds to the first network slice
  • at least one SSB corresponding to the first SDT configuration information is the SSB corresponding to the first network slice.
  • the first SDT configuration information corresponds to the first network slice group
  • at least one SSB corresponding to the first SDT configuration information is the SSB corresponding to the first network slice group.
  • the first SDT configuration information corresponds to the first network slice and the second network slice
  • at least one SSB corresponding to the first SDT configuration information is the SSB corresponding to the first network slice and/or the second network slice.
  • the at least one SSB may be SSB#1.
  • the terminal device uses a non-network slice-specific random access configuration to send an RRC recovery request message. Further, after the random access is completed, the terminal device sends the data of the first network slice to the first network device.
  • the first SDT configuration information includes data amount threshold #1 and RSRP threshold #1.
  • the terminal device sends the RRC recovery request message and the data of the first network slice to the first network device.
  • Condition (1) The sum of the data volumes of the network slices corresponding to the first SDT configuration information is less than or equal to the data volume threshold #1.
  • Condition (2) The RSRP of at least one SSB corresponding to the first SDT configuration information is greater than or equal to RSRP threshold #1.
  • the first SDT configuration information includes security parameter #1
  • the security parameter #1 includes a next hop chaining counter (next hop chaining counter, NCC).
  • the terminal device determines a key according to the NCC, and uses the key to encrypt data of the first network slice. Further, the terminal device sends the RRC recovery request message and the encrypted data of the first network slice to the first network device.
  • the first network device determines a key according to the NCC, and decrypts the data of the first network slice according to the key.
  • the first SDT configuration information includes time domain resource #1 of the CG and/or frequency domain resource #1 of the CG.
  • the terminal device sends the RRC recovery request message and the data of the first network slice on the time domain resource #1 of the CG and/or the frequency domain resource #1 of the CG.
  • the first SDT configuration information includes DMRS configuration #1 of the CG.
  • the terminal device sends the RRC recovery request message, the data of the first network slice and DMRS#1 to the first network device.
  • the DMRS #1 is sent according to the DMRS configuration #1 of the CG, and the DMRS #1 is used to demodulate the RRC recovery request message and the data of the first network slice.
  • the first SDT configuration information includes the uplink carrier selection threshold #1.
  • the terminal device selects an uplink carrier for sending the RRC recovery request message and the data of the first network slice according to the uplink carrier selection threshold #1.
  • the terminal device selects the normal uplink carrier to send the RRC recovery request message and the data of the first network slice.
  • the terminal device selects a supplementary uplink carrier to send the RRC recovery request message and the data of the first network slice.
  • the first SDT configuration information includes random access channel time-frequency resource #1 and PUSCH time-frequency resource #1 of the RA MSGA.
  • the terminal device uses two-step random access to initiate SDT. Specifically, the terminal device sends the random access preamble on the random access channel time-frequency resource #1, and sends the RRC recovery request message and the data of the first network slice on the PUSCH time-frequency resource #1 of the RA MSGA.
  • the first SDT configuration information includes time domain resource #1 of the CG and/or frequency domain resource #1 of the CG, and DMRS configuration #1 of the CG.
  • the terminal device sends the RRC recovery request message, the data of the first network slice and DMRS #1 on the time domain resource #1 of the CG and/or the frequency domain resource #1 of the CG.
  • the first SDT configuration information includes preamble #1, random access channel time-frequency resource #1, and uplink carrier selection threshold #1.
  • the terminal device selects an uplink carrier according to the uplink carrier selection threshold #1.
  • the terminal device After selecting the uplink carrier, the terminal device sends the preamble #1 on the random access channel time-frequency resource #1. Further, the terminal device receives the random access response of the first network device, and sends the RRC recovery request message and the data of the first network slice to the first network device according to the random access response.
  • the first network device may also send common (common) SDT configuration information (for example, non-slice-specific SDT configuration) to the terminal device.
  • common SDT configuration information for example, non-slice-specific SDT configuration
  • the terminal device may acquire it from the public SDT configuration information. For example, if the first SDT configuration information does not include the data volume threshold #1, the terminal device can obtain the data volume threshold from the public SDT configuration information, and judge whether to initiate the SDT process of the first network slice according to the data volume threshold.
  • the terminal device does not send data of network slices not corresponding to the first SDT configuration information to the first network device. For example, if the third network slice does not correspond to the first SDT configuration, then in S420, even if data of the third network slice arrives at the terminal device, the terminal device will not send the data of the third network slice to the first network device, The RB corresponding to the third network slice is also not restored.
  • the method 400 further includes: the terminal device sends the third network slice to the first network device.
  • the indication information, the third indication information indicates that the data of the third network slice/third network slice group arrives.
  • the third network slice group includes a third network slice.
  • the third network slice is different from the first network slice, and the third network slice group is different from the first network slice group.
  • the sign of the end of the SDT process of the first network slice is: after the terminal device sends the data of the first network slice to the first network device, it receives an RRC release message from the first network device.
  • the third indication information may be carried in the same message or a different message with the RRC recovery request message and the data of the first network slice.
  • the third indication information may be transmitted through a dedicated control channel (dedicated control channel, DCCH) or a MAC control element (MAC control element, MACCE).
  • DCCH dedicated control channel
  • MAC control element MAC control element
  • the terminal device For example, if before S420, the terminal device has data of the third network slice/third network slice group arriving, then in S420, the terminal device sends an RRC recovery request message, the data of the first network slice and the data of the first network slice to the first network device. 3. Instructions. That is to say, the terminal device carries the RRC recovery request message, the data of the first network slice and the third indication information in the same message.
  • the method 400 further includes: the terminal device sends third indication information to the first network device.
  • the terminal device receives an uplink scheduling message from the first network device. Further, the terminal device sends third indication information to the first network device according to the uplink scheduling message. Optionally, if the terminal device has remaining data of the first network slice/remaining data of the first network slice group to be transmitted, the terminal device sends the third indication information and the first network slice's data to the first network device according to the uplink scheduling message Remaining data/Remaining data of the first network slice group.
  • the terminal device When the terminal device sends the third indication information and the remaining data of the first network slice/the remaining data of the first network slice group to the first network device, it will still not send the third network slice/third network slice group to the first network device data, and the suspended RB corresponding to the third network slice/third network slice group will not be restored.
  • the third indication information is also used to indicate the data volume of the third network slice. For example, if the value of the third indication information is "0", then the third indication information indicates that no data of the third network slice arrives. If the value of the third indication information is "N”, the third indication information indicates that the data volume of the third network slice is N, where N is a positive number.
  • the method 400 may further include: the first network device sends a response message to the terminal device.
  • the terminal device receives the response message from the first network device.
  • the response message may be an RRC release message, an RRC recovery message, an uplink scheduling message, a downlink scheduling message, or a hybrid automatic repeat request (HARQ) acknowledgment (acknowledgment, ACK) message, etc.
  • HARQ hybrid automatic repeat request
  • the first network device may determine whether to allow the terminal device to enter RRC CONNECTED. If the first network device determines to allow the terminal device to enter RRC CONNECTED, the first network device sends an RRC recovery message to the terminal device to restore the RRC connection. If the first network equipment determines not to allow the terminal equipment to enter RRC CONNECTED, then the first network equipment sends an RRC release message to the terminal equipment.
  • the RRC release message may include new first SDT configuration information, and the new first SDT configuration information is used to indicate the next SDT configuration of the first network slice.
  • the first network device transmits the downlink control information (downlink control) of the response message on search space #1 or control resource set #1. information, DCI).
  • downlink control information downlink control
  • information DCI
  • the terminal device continues to transmit according to The first SDT configuration information sends the remaining data of the first network slice/the remaining data of the first network slice group to the first network device.
  • the terminal device continues to initiate the next SDT process of the first network slice according to the first SDT configuration information.
  • the first network device sends SDT configuration information at the granularity of network slicing (for example, the first SDT configuration information) to the terminal device, so that the terminal device can perform SDT based on network slicing according to the SDT configuration information at the granularity of network slicing Transmission (for example, sending the data of the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • SDT configuration information at the granularity of network slicing for example, the first SDT configuration information
  • the terminal device can perform SDT based on network slicing according to the SDT configuration information at the granularity of network slicing Transmission (for example, sending the data of the first network slice), so as to provide different service treatment for different users, meet the needs of different users, and improve user experience.
  • the terminal device in the RRC INACTIVE state saves its own context, and the former serving access network device also saves the context of the terminal device. If the terminal device moves from the coverage area of the former serving access network device to the coverage area of a new access network device, after the new access network device receives the small data from the terminal device, it needs to Obtain the context of the terminal device to interpret the small data.
  • the first network device in FIG. 5 is a new access network device
  • the second network device is a former access network device (the access network device that stores the context of the terminal device).
  • the method 500 may include S510 to S540 , and each step in the method 500 will be described in detail below.
  • the first network device sends first SDT configuration information, where the first SDT configuration information corresponds to the first network slice.
  • the terminal device receives first SDT configuration information.
  • the terminal device sends an RRC recovery request message and data of the first network slice.
  • the first network device receives the RRC recovery request message and the data of the first network slice.
  • the first network device sends a request message #1.
  • the second network device receives the request message #1.
  • the second network device is a former serving network device, and the second network device saves the context of the terminal device.
  • the second network device is a network device that has established an RRC connection with the terminal device before the terminal device enters the unconnected state.
  • the request message #1 is used to request the context of the terminal device, and the request message #1 includes auxiliary information of the first network slice.
  • the auxiliary information of the first network slice includes one or more of the following: an identifier of the first network slice, first admission information, a data volume of the first network slice, and priority information of the first network slice.
  • the first admission information is used to indicate whether the first network device can accept the first network slice.
  • the request message is #1 obtain UE context request (retrieve UE context request) message.
  • the first SDT configuration information may correspond to the first network slice group, and the first network slice group includes the first network slice.
  • the auxiliary information of the first network slice includes one or more of the following: the identifier of the first network slice group, the data size of the first network slice group, the first - Admission information, priority information of the first network slice group.
  • the first admission information may be used to indicate whether the first network device can accept the first network slice group.
  • the first network device may Calculate the data volume of the first network slice group.
  • the request message #1 may also include the third Auxiliary information for network slices.
  • the auxiliary information of the third network slice includes one or more of the following: an identifier of the third network slice, second admission information, third indication information, and priority information of the third network slice.
  • the second admission information is used to indicate whether the first network device can accept the third network slice.
  • the priority information of the first network slice is whether the priority of the first network slice is higher than that of the third network slice.
  • the priority information of the third network slice is whether the priority of the third network slice is higher than that of the first network slice.
  • the auxiliary information of the third network slice includes one or more of the following: the identifier of the third network slice group, the second admission information, the second Three indication information, priority information of the third network slice group.
  • the second admission information is used to indicate whether the first network device can accept the third network slice group.
  • the third network slice group includes a third network slice.
  • the terminal device may send third indication information to the first network device after S420. That is to say, the first network device receives the third indication information after receiving the RRC recovery request message and the data of the first network slice. In this case, after receiving the RRC recovery request message and the data of the first network slice, the first network device sends a request message #1 to the second network device. Further, after receiving the third indication information, the first network device sends a request message #2 to the second network device, where the request message #2 includes auxiliary information of the third network slice.
  • the second network device sends a response message.
  • the first network device receives the response message.
  • the second network device After receiving the request message #1 sent by the first network device, the second network device determines, according to the auxiliary information of the first network slice included in the request message #1, that it is the first network slice/the first network slice group that initiates the SDT process. For example, the second network device may determine according to the identifier of the first network slice that it is the first network slice that initiates the SDT process. Alternatively, the second network device may determine, according to the identifier of the first network slice group, that it is the first network slice group that initiates the SDT process.
  • the second network device determines whether to perform anchor relocation (anchor relocation) according to the auxiliary information of the first network slice.
  • the auxiliary information of the first network slice includes first admission information.
  • the second network device may determine whether to perform anchor relocation according to the first admission information. For example, if the first admission information indicates that the first network device can accept the first network slice/the first network slice group, the second network device determines to perform anchor relocation. If the first admission information indicates that the first network device cannot accept the first network slice/the first network slice group, the second network device determines not to perform anchor relocation.
  • the auxiliary information of the first network slice includes priority information of the first network slice/first network slice group.
  • the second network device determines whether to perform anchor relocation based on the priority information of the first network slice/first network slice group. For example, if the priority of the first network slice/first network slice group is higher (for example, higher than a preset threshold), the second network device determines to perform anchor relocation. If the priority of the first network slice/first network slice group is low (for example, lower than a preset threshold), the second network device determines not to perform anchor relocation. Or, if the priority of the first network slice/the first network slice group is "high”, the second network device determines to perform anchor relocation. If the priority of the first network slice/first network slice group is "low (low)", the second network device determines not to perform anchor relocation.
  • the second network device determines to perform anchor relocation after receiving the request message #1 by default.
  • the second network device determines not to perform anchor relocation.
  • the second network device when the auxiliary information of the first network slice does not include the first admission information, the second network device does not perform anchor relocation by default.
  • the second network device may determine the There is data arrival of the third network slice/third network slice group. For example, the second network device determines according to the identifier of the third network slice that data of the third network slice arrives at the terminal device. Alternatively, the second network device determines, according to the identifier of the third network slice group, that data of the third network slice group arrives at the terminal device. For another example, the second network device determines, according to the third indication information, that data of the third network slice/third network slice group arrives at the terminal device. For example, when the third indication information indicates that the data volume of the third network slice/third network slice group is not 0, the second network device determines that data of the third network slice/third network slice group arrives at the terminal device.
  • the second network device may also consider auxiliary information of the third network slice.
  • the auxiliary information of the first network slice includes first admission information
  • the auxiliary information of the third network slice includes second admission information
  • the second network device may determine whether to perform anchor relocation according to the first admission information and the second admission information. For example, if the first admission information indicates that the first network device can accept the first network slice/the first network slice group, and the second admission information indicates that the first network device can accept the third network slice/the third network slice group, then the second The second network device determines that anchor relocation can be performed.
  • the second The second network device determines that anchor relocation can be performed. Or, if the first admission information indicates that the first network device cannot accept the first network slice/the first network slice group, and the second admission information indicates that the first network device cannot accept the third network slice/the third network slice group, then the second The second network device determines that anchor relocation can be performed. Or, if the first admission information indicates that the first network device cannot accept the first network slice/the first network slice group, and the second admission information indicates that the first network device can accept the third network slice/the third network slice group, then the second The second network device determines that anchor relocation can be performed. If the first admission information indicates that the first network slice cannot accept the first network slice/the first network slice group, and the second admission information indicates that the first network device cannot accept the third network slice/the third network slice group, then the second The second network device determines not to perform anchor relocation.
  • the auxiliary information of the first network slice does not include the first admission information
  • the auxiliary information of the third network slice does not include the second admission information.
  • the second network device does not perform anchor relocation by default.
  • the response message sent by the second network device to the first network device includes the context of the terminal device.
  • the response message is a retrieve UE context response (retrieve UE context response) message.
  • the response message sent by the second network device to the first network device includes a tunnel address for uplink data forwarding.
  • the response message is a UE context failure (retrieve UE context failure) message.
  • the second network device also sends the RLC configuration to the first network device, for the first network device to process the RLC data including the first network slice.
  • the first network device after receiving the response message from the second network device, the first network device sends a response message (such as an RRC release message) to the RRC recovery request message to the terminal device.
  • a response message such as an RRC release message
  • the first network device may determine whether to allow the terminal device to enter RRC CONNECTED. If the first network device determines to allow the terminal device to enter RRC CONNECTED, the first network device sends an RRC recovery message to the terminal device to restore the RRC connection. If the first network device determines not to allow the terminal device to enter RRC CONNECTED, the first network device sends an RRC release message to the terminal device.
  • the first network device sends an RRC release message in the UE context acquisition failure message to the terminal device.
  • an interaction process between two network devices is designed, so as to facilitate the realization of the network slicing-based SDT.
  • Fig. 6 is a schematic block diagram of a communication device provided by an embodiment of the present application.
  • the communication device 1000 may include a processing unit 1100 and a transceiver unit 1200 .
  • the communications apparatus 1000 may correspond to the terminal device in the foregoing method embodiments.
  • it may be a terminal device, or a component (such as a chip or a chip system, etc.) configured in the terminal device.
  • the communication device 1000 may correspond to the terminal device in the methods 400 to 500 in the embodiment of the present application, and the communication device 1000 may include a terminal device for executing the method 400 in FIG. 4 or the method 500 in FIG. The unit of the method. Moreover, each unit in the communication device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement the corresponding flow of the method 400 in FIG. 4 or the method 500 in FIG. 5 . It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the transceiver unit 1200 in the communication device may be implemented through an input/output interface, and the processing unit 1100 in the communication device 1000 may be implemented through the chip or the chip Implementations such as processors, microprocessors, or integrated circuits integrated on a system.
  • the communications apparatus 1000 may correspond to the network device in the foregoing method embodiments.
  • it may be a network device, or be configured with a component (such as a chip or a chip system, etc.) in the network device.
  • the communication apparatus 1000 may correspond to the first network device in the methods 400 to 500 in the embodiment of the present application, and the communication apparatus 1000 may include a first network device for executing the method 400 in FIG. 4 or the method 500 in FIG. 5 .
  • each unit in the communication device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement the corresponding flow of the method 400 in FIG. 4 or the method 500 in FIG. 5 . It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the communication apparatus 1000 may correspond to the second network device in the method 500 of the embodiment of the present application, and the communication apparatus 1000 may include a unit for performing the method performed by the second network device in the method 500 in FIG. 5 .
  • each unit in the communication device 1000 and the above-mentioned other operations and/or functions are respectively intended to implement a corresponding flow of the method 500 in FIG. 5 . It should be understood that the specific process for each unit to perform the above corresponding steps has been described in detail in the above method embodiments, and for the sake of brevity, details are not repeated here.
  • the transceiver unit 1200 in the communication device may be implemented through an input/output interface, and the processing unit 1100 in the communication device 1000 may be implemented through the chip or chip system Integrated processors, microprocessors, or integrated circuits.
  • Fig. 7 is a schematic block diagram of a communication device provided by another embodiment of the present application.
  • the communication device 2000 shown in FIG. 7 may include: a memory 2100 , a processor 2200 , and a communication interface 2300 .
  • the memory 2100, the processor 2200, and the communication interface 2300 are connected through an internal connection path, the memory 2100 is used to store instructions, and the processor 2200 is used to execute the instructions stored in the memory 2100 to control the input/output interface to receive/send messages arts.
  • the memory 2100 may be coupled with the processor 2200 through an interface, or may be integrated with the processor 2200 .
  • the above-mentioned communication interface 2300 uses a transceiver device such as but not limited to a transceiver to implement communication between the communication device 2000 and other devices or communication networks.
  • the above-mentioned communication interface 2300 may also include an input/output interface (input/output interface).
  • each step of the above method may be completed by an integrated logic circuit of hardware in the processor 2200 or instructions in the form of software.
  • the methods disclosed in the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory 2100, and the processor 2200 reads the information in the memory 2100, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
  • the processor may be a central processing unit (central processing unit, CPU), and the processor may also be other general-purpose processors, digital signal processors (digital signal processor, DSP), dedicated integrated Circuit (application specific integrated circuit, ASIC), off-the-shelf programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA off-the-shelf programmable gate array
  • a general-purpose processor can be a microprocessor, or the processor can be any conventional processor, or the like.
  • the memory may include a read-only memory and a random access memory, and provide instructions and data to the processor.
  • a portion of the processor may also include non-volatile random access memory.
  • the processor may also store device type information.
  • FIG. 8 is a schematic diagram of a chip system according to an embodiment of the present application.
  • the chip system here may also be a system composed of circuits.
  • the chip system 3000 shown in FIG. 8 includes: a logic circuit 3100 and an input/output interface 3200, the logic circuit 3100 is used to couple with the input interface, and transmit data (such as the first SDT configuration information) through the input/output interface, to execute the method described in FIG. 4 or FIG. 5 .
  • the embodiment of the present application also provides a processing device, including a processor and an interface; the processor is configured to execute the method in any one of the above method embodiments.
  • the above processing device may be one or more chips.
  • the processing device may be a field programmable gate array (field programmable gate array, FPGA), an application specific integrated circuit (ASIC), or a system chip (system on chip, SoC). It can be a central processor unit (CPU), a network processor (network processor, NP), a digital signal processing circuit (digital signal processor, DSP), or a microcontroller (micro controller unit) , MCU), can also be a programmable controller (programmable logic device, PLD) or other integrated chips.
  • CPU central processor unit
  • NP network processor
  • DSP digital signal processor
  • microcontroller micro controller unit
  • PLD programmable logic device
  • each step of the above method can be completed by an integrated logic circuit of the hardware in the processor or an instruction in the form of software.
  • the steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware or software modules in the processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware. To avoid repetition, no detailed description is given here.
  • the processor in the embodiment of the present application may be an integrated circuit chip, which has a signal processing capability.
  • each step of the above-mentioned method embodiments may be completed by an integrated logic circuit of hardware in a processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components .
  • DSP digital signal processor
  • ASIC application-specific integrated circuit
  • FPGA field-programmable gate array
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like.
  • the steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register.
  • the storage medium is located in the memory, and the processor reads the information in the memory, and completes the steps of the above method in combination with its hardware.
  • the memory in the embodiments of the present application may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories.
  • the non-volatile memory can be read-only memory (read-only memory, ROM), programmable read-only memory (programmable ROM, PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erases programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (RAM), which acts as external cache memory.
  • RAM random access memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • ESDRAM enhanced synchronous dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • direct rambus RAM direct rambus RAM
  • the present application also provides a computer program product, the computer program product including: computer program code, when the computer program code is run on the computer, the computer is made to execute the computer program described in Fig. 4 to Fig. 5 .
  • the present application also provides a computer-readable storage medium, the computer-readable storage medium stores program codes, and when the program codes are run on a computer, the computer is made to execute The method performed by the terminal device or the network device (the first network device and/or the second network device) in the embodiment shown in 5.
  • the present application further provides a system, which includes the aforementioned terminal device and network device (first network device and/or second network device).
  • the terminal equipment in the above-mentioned various device embodiments completely corresponds to the terminal equipment in the method embodiments
  • the network equipment in the above-mentioned various device embodiments completely corresponds to the network equipment in the method embodiments, and corresponding steps are performed by corresponding modules or units
  • the transceiver unit executes the steps of receiving or sending in the method embodiments, and the steps other than sending and receiving can be executed by the processing unit (processor).
  • the processing unit processor
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be components.
  • One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • a component may, for example, be based on a signal having one or more packets of data (such as data from two components interacting with another component between a local system, a distributed system, and/or a network, such as the Internet through a signal interacting with other systems). Communicate through local and/or remote processes.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication interface shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may also be distributed to multiple network units, Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • each functional unit may be fully or partially implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product comprises one or more computer instructions (programs). When the computer program instructions (program) are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server or data center by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (such as a floppy disk, a hard disk, a magnetic tape), an optical medium (such as a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (such as a solid state disk (solid state disk, SSD) ))Wait.
  • a magnetic medium such as a floppy disk, a hard disk, a magnetic tape
  • an optical medium such as a high-density digital video disc (digital video disc, DVD)
  • a semiconductor medium such as a solid state disk (solid state disk, SSD)
  • the computer software product is stored in a storage medium and includes several instructions to make a A computer device (which may be a personal computer, a server, or a network device, etc.) executes all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande concerne un procédé de communication et un appareil de communication. Le procédé est appliqué à un dispositif terminal. Le procédé comprend les étapes suivantes : réception de premières informations de configuration de transmission de petites données (SDT) provenant d'un premier dispositif de réseau, les premières informations de configuration de SDT correspondant à une première tranche de réseau ; et selon les premières informations de configuration de SDT, envoi d'un message de demande de reprise de commande de ressources radio (RRC) et de données de la première tranche de réseau au premier dispositif de réseau. Dans la présente demande, une solution de SDT sur la base d'une tranche de réseau peut être mise en œuvre pour satisfaire aux exigences de différents utilisateurs.
PCT/CN2022/088341 2021-05-31 2022-04-22 Procédé de communication et appareil de communication WO2022252867A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP22814914.2A EP4336884A1 (fr) 2021-05-31 2022-04-22 Procédé de communication et appareil de communication
US18/522,425 US20240098830A1 (en) 2021-05-31 2023-11-29 Communication method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110597946.0 2021-05-31
CN202110597946.0A CN115484615A (zh) 2021-05-31 2021-05-31 通信方法及通信装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/522,425 Continuation US20240098830A1 (en) 2021-05-31 2023-11-29 Communication method and apparatus

Publications (1)

Publication Number Publication Date
WO2022252867A1 true WO2022252867A1 (fr) 2022-12-08

Family

ID=84322758

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/088341 WO2022252867A1 (fr) 2021-05-31 2022-04-22 Procédé de communication et appareil de communication

Country Status (4)

Country Link
US (1) US20240098830A1 (fr)
EP (1) EP4336884A1 (fr)
CN (1) CN115484615A (fr)
WO (1) WO2022252867A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116489723A (zh) * 2022-01-14 2023-07-25 荣耀终端有限公司 通信方法、装置及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107404759A (zh) * 2016-05-20 2017-11-28 电信科学技术研究院 一种寻呼方法及装置
CN111869310A (zh) * 2018-04-10 2020-10-30 中兴通讯股份有限公司 用于执行小数据快速路径通信的方法和系统
WO2021091435A1 (fr) * 2019-11-04 2021-05-14 Telefonaktiebolaget Lm Ericsson (Publ) Procédés et appareils pour gérer des dispositifs de communication corrompus dans un réseau de communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107404759A (zh) * 2016-05-20 2017-11-28 电信科学技术研究院 一种寻呼方法及装置
CN111869310A (zh) * 2018-04-10 2020-10-30 中兴通讯股份有限公司 用于执行小数据快速路径通信的方法和系统
WO2021091435A1 (fr) * 2019-11-04 2021-05-14 Telefonaktiebolaget Lm Ericsson (Publ) Procédés et appareils pour gérer des dispositifs de communication corrompus dans un réseau de communication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZTE CORPORATION: "SDT RACH resource configuration and coordination with other WIs (REDCAP, Coverage- ext, RAN-Slicing)", 3GPP DRAFT; R2-2106452, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Electronic meeting; 20210519 - 20210527, 14 May 2021 (2021-05-14), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP052011864 *

Also Published As

Publication number Publication date
CN115484615A (zh) 2022-12-16
EP4336884A1 (fr) 2024-03-13
US20240098830A1 (en) 2024-03-21

Similar Documents

Publication Publication Date Title
US10313879B2 (en) Connection modification method applicable to base station
KR102463290B1 (ko) 차세대 이동통신 시스템에서 네트워크 소모 전력을 효과적으로 절감시키는 방법 및 장치
WO2019128947A1 (fr) Procédé de communication et dispositif de communication
WO2018027988A1 (fr) Procédé de sélection de tranches de réseau, dispositif d'accès sans fil, et terminal
WO2013075602A1 (fr) Procédé, station de base et équipement d'utilisateur pour obtenir une agrégation de porteuses
CN109691154B (zh) 基于密钥刷新的按需网络功能重新认证
KR20200043457A (ko) Rrc 재개/일시중단 시의 nr pdcp 보존을 위한 방법들 및 장치들
US11412571B2 (en) Communication method and communications apparatus to deliver first data to an upper layer
WO2018166338A1 (fr) Procédé et appareil de mise à jour de clé
WO2021160091A1 (fr) Procédé et appareil de commutation de groupe
CN115299107A (zh) 重建立的方法和通信装置
WO2019158117A1 (fr) Système et procédé pour assurer la sécurité dans un système de communication sans fil avec séparation de plan utilisateur
US20240098830A1 (en) Communication method and apparatus
WO2019076347A1 (fr) Procédé de communication, et appareil de communication
WO2021233340A1 (fr) Procédé et appareil d'enregistrement de réseau
US20220377541A1 (en) Key Management Method and Communication Apparatus
US10560870B2 (en) Device and method of handling cellular-WLAN aggregation
US11533613B2 (en) Providing secure communications between computing devices
WO2021238813A1 (fr) Procédé et appareil d'obtention de clé
EP4236449A1 (fr) Procédé et appareil de migration de n?ud iab
CN110235512B (zh) 无线通信网络中的控制平面延迟减小
WO2022141025A1 (fr) Procédé et appareil de transmission de données
WO2023213191A1 (fr) Procédé de protection de sécurité et appareil de communication
WO2023155655A1 (fr) Procédé et appareil de détection de capacité de puissance de calcul
WO2023160199A1 (fr) Procédé et appareil d'accès à un réseau de communication

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22814914

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022814914

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022814914

Country of ref document: EP

Effective date: 20231204

NENP Non-entry into the national phase

Ref country code: DE